General
-
Target
node-kakao-prviate.exe
-
Size
6.9MB
-
Sample
241016-21fnjaxhrf
-
MD5
a9fd591d68e38b6f18f25971316c5635
-
SHA1
e0bd7e2fc6d97f422a900bb358fc51024c064095
-
SHA256
5aa25cb0fb8a46ede360afe1f3548c013b09eeebb05d3e6bb2da123cf7174b90
-
SHA512
9aa8b6e4f0c4fc975957f1abfad788d2cfbacfe976ed70e050e3f021d3e0003734b5469500f9c40cf6f56eae62a0ab382cf64ddefbb0e7ea40cbf5c47515d678
-
SSDEEP
98304:JhDjWM8JEE1rhamaHl3Ne4i3Tf2PkOpfW9hZMMoVmkzhxIdfXeRpYKJJcGhEIFWl:Jh0seNTfm/pf+xk4dWRptrbWOjgr3
Behavioral task
behavioral1
Sample
node-kakao-prviate.exe
Resource
win7-20240708-en
Malware Config
Targets
-
-
Target
node-kakao-prviate.exe
-
Size
6.9MB
-
MD5
a9fd591d68e38b6f18f25971316c5635
-
SHA1
e0bd7e2fc6d97f422a900bb358fc51024c064095
-
SHA256
5aa25cb0fb8a46ede360afe1f3548c013b09eeebb05d3e6bb2da123cf7174b90
-
SHA512
9aa8b6e4f0c4fc975957f1abfad788d2cfbacfe976ed70e050e3f021d3e0003734b5469500f9c40cf6f56eae62a0ab382cf64ddefbb0e7ea40cbf5c47515d678
-
SSDEEP
98304:JhDjWM8JEE1rhamaHl3Ne4i3Tf2PkOpfW9hZMMoVmkzhxIdfXeRpYKJJcGhEIFWl:Jh0seNTfm/pf+xk4dWRptrbWOjgr3
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-